Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

AppSignal Ruby Gem 2.11: Active Job and Friends

We just released Ruby Gem 2.11. We are always making things easier to use for you, so more things work out of the box and more instrumentation and dashboarding is built without you doing any heavy lifting. This release has a big overhaul of Active Job support. The cherry on the stroopwafel cake is the automatically generated dashboard with status per queue, queue throughput and queue times. 2.11 also polishes a lot of other integrations. Let’s dive in.

Resolve Systems Named a Strong Performer in Infrastructure Automation

We are excited to share that Resolve has been named a Strong Performer in “The Forrester Wave™: Infrastructure Automation Platforms, Q3 2020.” This report evaluates how the 13 most significant infrastructure automation platform providers measure up and helps infrastructure and operations professionals select the right solution for their needs.

Make sense of SCOM Alerts with SquaredUp 4.7

One of the most common complaints about SCOM is the noisiness of alerts from Management Packs. Getting on top of these alerts can be a huge challenge and often the thing that most gets in the way of an organization getting value out of SCOM. In SquaredUp for SCOM 4.7, our recent feature-packed update, we bring you three new alert-handling super-powers to help you get on top of alerts.

New in Grafana 7.1: Gain new data insights with InfluxDB and Flux query support

The audience was buzzing when Ryan McKinley, VP of Innovation at Grafana Labs, demoed the new native support for InfluxDB Flux queries in his talk at the InfluxDays virtual conference in late June. Whether the goal is to build IoT applications, or monitor DevOps infrastructure or another application or system, it’s important to move beyond just visualizing the data.

The Pain of Debugging WebAssembly

If you know anything about WebAssembly (WASM), it’s probably that WASM lets you execute code compiled from languages such as C, C++, Rust, or others in the browser at almost native speeds. You might be less familiar with the fact that WASM is not only an interesting technology in the browser, but also in other environments that require fast sandboxing. As such, WASM has found some popularity with edge computing and as a lightweight docker replacement for certain situations.

Automate registry scanning with Harbor & Sysdig

Discover what registry scanning is, how it helps with shifting security left, and how you can implement it using Harbor and Sysdig. Shifting security left is all about moving security to the earliest possible moment in the development process, dramatically improving “time to fix” and security impact. In this article, we’re going to show you how to shift left with Harbor registry and Sysdig Secure.

Disaster Recovery Preparedness for Your Kubernetes Clusters

In the pre-Kubernetes, pre-container world, backup and recovery solutions were generally implemented at the virtual machine (VM) level. That works for traditional applications when an application runs on a single VM. But when applications are containerized and managed with an orchestrator like Kubernetes, this system falls apart. That means effective disaster recovery (DR) plans for Kubernetes must be designed for containerized architectures and natively understand the way Kubernetes functions.

How to optimize your logging costs

CIOs see data costs as their greatest logging challenge to overcome, according to this survey we collaborated on with IDC. If you’re running significant production operations, you’re almost certainly generating 100’s of GB of log data every day. Naturally, you’re also monitoring those logs and querying for incident investigations. However, most log data is never queried or analyzed, yet makes up the majority of logging costs.

Ensuring Availability and Security for Remote Workers

The year 2020 has seen various changes throughout the world but no change has seen more of an impact than the Corona-virus. During this epidemic, workers from all industries have moved from a traditional office-based role to WFH (Working From Home). It’s known as a business transforms it brings new risks associated with it. New and emerging technologies and the practices they involve require operational, policy and security measures to be implemented and evolved over time.